Subscribe to my newsletter and never miss my upcoming articles
In the previous article of this series, we learned how to use Recon-ng. Through this tool, we have known how we can gather information about our target. Now it's time to identify technical weakness the target may have in its services like web apps,...
In the previous article of this series, we learned about how to use theHarvester tool. theHarvester is a good tool but, it is not sufficient when it comes to Information Gathering. theHarvester is mainly used for passive reconnaissance, Passive Rec...
You might be considering to taking all your infrastructure to serverless. Why? because it costs less no need to worry about managing servers, Right? Well now it's time for you to think once again before making this decision especially if you are a st...
Are you a developer? If you then answer a question. In the last couple of years have you heard anyone saying that "Hey, I will be using Html and CSS for my next project..." Have you? I at least haven't listened to something like this, I often hear pe...
As a developer, you will always agree that nothing in this world (especially in tech) is 100% secure. Whether you are making the next fancy software or maybe the next big tech giant bugs and security issues will be a part of your journey. Some proble...
This is the first tool in the Red Team Tools series that I will be talking to you today. In this post, you will learn how to gather both technical and helpful information about your target using theHarvester tool. In a red team engagement, one of ...